DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

WI: Milwaukee to file complaint against Dynacare after security breach

Posted on November 21, 2013 by Dissent

Hell hath no fury like a city breached? The City of Milwaukee issued this statement today:

Statement of Milwaukee City Attorney Grant Langley

November 21, 2013

After consultation with members of the Common Council and the Mayor, the Office of the City Attorney has decided to file a formal complaint with the federal Office of Civil Rights against Dynacare Laboratories for its admitted breach of HIPAA security requirements regarding the private information of more than 9,000 City of Milwaukee employees, their spouses and their domestic partners.

I will be taking this action on behalf of the city and its employees based on Dynacare’s recent filing of a notice of breach of unsecured protected health information, its apparent unwillingness to communicate or cooperate with city representatives or to release details of its investigation, its failure to provide information to the city in order to protect our employees and the misleading comments Dynacare provided to the media.

It is important to note that the city’s contract for its wellness program is with Froedtert Community Health/Workforce Health. That is the entity to which the city provided employee information in a secured and password-protected manner, not Dynacare. The city continues to investigate the matter, and at this time has not ruled out further litigation.

Of course, some of this “we’re filing a formal complaint” bit is a bit absurd since Dynacare has already self-reported the breach to HHS. Maybe the city doesn’t trust Dynacare’s report to be accurate and wants to ensure that HHS fully understands how upset the city is at Dynacare’s lack of prompt notification and greater disclosure.

Curiously, the city did not say it would file a complaint against Froedtert Community Health/Workforce Health. Because they had provided the data to them in secure format, you’d think they would complain that Froedtert failed to ensure that the party they passed it on to maintained it in secure format.  According to the Journal Sentinel,  Froedtert Health Inc. has an ownership interest in Dynacare, but  the management of Dynacare is contracted to a subsidiary of Laboratory Corporation of America Holdings. Froedtert Community Health/Workforce Health is  affiliated with Froedtert Health. So now everyone can pull out the contracts and HIPAA regulations to see how many of these entities have responsibility for, or liability for, the breach.

Don Walker of the Journal Sentinel provides some additional details that suggest this case is about to get even messier:

 The [stolen employee] car contained a flash drive with the personal information of 9,414 city employees, their spouses or domestic partners.

The personal information included the names, addresses, dates of birth, Social Security numbers and gender of an estimated 6,000 city employees. The flash drive also had the names of more than 3,000 spouses and domestic partners of those workers, although their Social Security numbers were not included, the company said.

However, a domestic partner of a city employee provided the Journal Sentinel with a copy of a letter Dynacare sent to him, informing him that his Social Security number was on the missing flash drive. There is also evidence that people who opted out of the wellness program had their Social Security numbers and other information on the flash drive, Barrett said.

If they opted out, why were their details on the drive? While you can be understandably outraged at Dynacare for the sloppy security practices by its employee, the city itself needs to explain why information on those who opted out were shared with Froedtert Community Health in the first place.


Related:

  • Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack
  • Attleboro investigating ‘cybersecurity incident' impacting city's IT systems
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • From bad to worse: Doctor Alliance hacked again by same threat actor (2)
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
Category: Government SectorTheftU.S.

Post navigation

← Kroll Background America hacked (update4)
WI: Milwaukee to file complaint against Dynacare after security breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Des Moines Man Charged with Computer Fraud
  • CrowdStrike catches insider feeding information to ScatteredLapsus$Hunters
  • Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack
  • Attleboro investigating ‘cybersecurity incident’ impacting city’s IT systems
  • Fired techie admits sabotaging ex-employer, causing $862K in damage
  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • Large medical lab in South Africa suffers multiple data breaches

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Cole v. Quest Diagnostics: The Third Circuit Weighs in on Pixels, Privacy, and Medical Data
  • Closing the Privacy Gap: HIPRA Targets Health Apps and Wearables
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.